[29493] in bugtraq

home help back first fref pref prev next nref lref last post

Re: WebDAV exploit: using wide character decoder scheme

daemon@ATHENA.MIT.EDU (Dave Aitel)
Wed Mar 26 17:17:10 2003

Date: Wed, 26 Mar 2003 11:14:43 -0500
From: Dave Aitel <dave@immunitysec.com>
To: bugtraq@securityfocus.com
Message-Id: <20030326111443.6fb287a3.dave@immunitysec.com>
In-Reply-To: <000f01c2f39f$522b3c30$1ecdfea9@hacksware2002>
Mime-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit

Unfortunately, on my US Windows 2K SP3 build (and I assume all others),
those %u directives get translated into question marks. (0x003F in hex)
:<

This exploit must be much easier to get reliable on other language
versions. A shame, really.

Did you use my encoder or did you write your shellcode manually, just
out of curiosity?

Dave Aitel
Advanced Engineering Directorate
Immunity, Inc.
http://www.immunitysec.com/CANVAS/ "Hacking like it's done in the
movies."

On Wed, 26 Mar 2003 22:55:12 +0900
¿ÀÁ¤¿í <mat@panicsecurity.org> wrote:
> my @return_addresses=(
> "%u32ac%u77e2",
> "%uc1b5%u76ae",
> "%u005d%u77a5",

home help back first fref pref prev next nref lref last post